Suggested Topics within your search.
Suggested Topics within your search.
-
1741
Context-Aware Embedding Techniques for Addressing Meaning Conflation Deficiency in Morphologically Rich Languages Word Embedding: A Systematic Review and Meta Analysis
Published 2024-10-01“…The results point to a sizable impact size, but the estimates are highly unclear, as evidenced by the huge standard error and non-significant <i>p</i>-value. …”
Get full text
Article -
1742
An Ultra-Low-Power 0.8 V, 60 nW Temperature Sensor for Battery-Less Wireless Sensor Networks
Published 2025-01-01“…Measurements show an inaccuracy of +1.5/−1.6 °C from −20 °C to 120 °C after two-point calibration, with a resolution of 0.2 °C (rms) and a resolution FoM of 0.022 nJ·K<sup>−2</sup>. …”
Get full text
Article -
1743
LiGenCam: Reconstruction of Color Camera Images from Multimodal LiDAR Data for Autonomous Driving
Published 2025-07-01“…The automotive industry is advancing toward fully automated driving, where perception systems rely on complementary sensors such as LiDAR and cameras to interpret the vehicle’s surroundings. …”
Get full text
Article -
1744
A Novel Beam Steerable Antenna Employing Tunable High Impedance Surface With Liquid Crystal
Published 2020-01-01Get full text
Article -
1745
Almost Periodic Solutions of Differential Equations with Generalized Piecewise Constant Delay
Published 2024-11-01“…Our results are derived by utilizing the properties of the <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><mo>(</mo><msub><mi>μ</mi><mn>1</mn></msub><mo>,</mo><msub><mi>μ</mi><mn>2</mn></msub><mo>)</mo></mrow></semantics></math></inline-formula>-exponential dichotomy, Cauchy and Green matrices, a Gronwall-type inequality for DEGPCD, and the Banach fixed point theorem. …”
Get full text
Article -
1746
Hardware-Efficient Neural Network Digital Predistortion for Terahertz Power Amplifiers Using DeepShift and Pruning
Published 2025-01-01“…With the increasing demand for high data rates in wireless communication systems, broadband signals with high peak-to-average power ratio (PAPR) are being utilized, and higher frequency bands such as terahertz waves are being adopted. …”
Get full text
Article -
1747
Exposure to maternal nicotine in utero and/or via lactation alters craniofacial development in mice.
Published 2025-01-01“…As the use of nicotine is increasing among youths, especially through use of electronic nicotine delivery systems, there is a great need to investigate the critical periods of nicotine exposure during pregnancy and postnatal development. …”
Get full text
Article -
1748
Anonymous group key distribution scheme for the internet of vehicles
Published 2023-10-01“…Vehicular ad hoc networks (VANET) play a crucial role in intelligent transportation systems by providing driving information and services such as collision prevention and improved traffic efficiency.However, when a trusted third party (TTP) interacts with a vehicle in VANET, it can be vulnerable to security threats like eavesdropping, tampering, and forgery.Many existing schemes rely heavily on TTP for key negotiation to establish session keys and ensure session security.However, this over-reliance on TTP can introduce a single point of failure and redundancy issues when TTP sends the same information to multiple vehicles.Additionally, key negotiation methods used for creating group session keys often result in increased interaction data and interaction times.An anonymous group key distribution scheme for the internet of vehicles was proposed to address these challenges.The Road Side Units (RSUs) were used to facilitate the creation of group session keys among multiple vehicles.Identity-based public key cryptography and an improved multi-receiver encryption scheme were utilized for communication between RSUs and vehicles, enabling two-way authentication and secure distribution of group session keys.During the key distribution process, a single encryption operation was sufficient to allow all group members to obtain a consistent session key.This reduced the reliance on TTP for authentication and group communication.Formal security proofs demonstrate that the proposed scheme satisfies basic security requirements.Furthermore, performance analysis and comparisons indicate that this scheme offers lower computational overhead and communication overhead compared to similar schemes.…”
Get full text
Article -
1749
Imaging performance of portable and conventional ultrasound imaging technologies for ophthalmic applications.
Published 2024-01-01“…These findings suggest the value to further study the use of portable ultrasound systems and their utility in routine eye care.…”
Get full text
Article -
1750
Ismāʿīlī - Fāṭimid Legal Education and Judicial Activities in Egypt
Published 2025-06-01“…Killis (380/991) on legal education and the judicial system, are promi-nent topics related to Ismāʿīlī legal instruction. …”
Get full text
Article -
1751
SDG11-Based Sustainability Assessment of Urban Communities: A Case Study of Changsha
Published 2025-01-01“…Based on the "economy-society-environment" three-dimensional theoretical framework for sustainable development, this study deconstructs the connotation of SDG11 at the community level, and constructs an urban community sustainability assessment indicator system containing 7 goals and 13 indexes. In addition, by taking 602 sample communities in the built-up regions of Changsha as an example, this study utilizes multi-source big data to comprehensively assess community sustainability as well as the coupling coordination degree of the communities' economic-social-environmental systems. …”
Get full text
Article -
1752
Analysis of Predator–Prey Model With Inclusion of Temperature Variability in Prey Refugees
Published 2024-01-01“…This study explores the relationship between prey and predator populations in the context of climate-induced temperature changes. Utilizing linearization and the Lyapunov approach, we analyze the local and global stability of the system’s equilibrium points. …”
Get full text
Article -
1753
Quantum Algorithms’ Approach: A Case Study on Bladeless Wind Turbine and Solar Panel
Published 2025-01-01“…Since VQE, VQD and QAOA have not been accurate in finding optimal data point, hence QAE is utilized. Additionally, QAE’s precision in amplifying high-probability quantum states aligns well with the periodic and structured nature of wind and solar energy datasets.…”
Get full text
Article -
1754
Stability analysis and numerical simulations of a discrete-time epidemic model
Published 2025-03-01“…To assess the global stability of the system, we utilize the Lyapunov method, a powerful analytical technique that enables us to derive sufficient conditions for global asymptotic stability. …”
Get full text
Article -
1755
Solving Nonlinear Fractional Models in Superconductivity Using the q-Homotopy Analysis Transform Method
Published 2023-01-01“…Several graphs have been presented for the solutions obtained utilizing different levels of the fractional-order derivative and at various points in time.…”
Get full text
Article -
1756
Force fields for molecular dynamics simulations of charged dust particles with finite size in complex plasmas
Published 2025-02-01“…The presented model has a wide utility for the description of various processes in dusty plasmas. …”
Get full text
Article -
1757
A 120 GHz Hybrid Low Noise Amplifier in 40 nm CMOS
Published 2024-01-01“…In this paper, we present a 6-stage 120 GHz hybrid low noise amplifier (LNA) for sub-THz radar systems. To enhance the noise figure (NF) and gain performance of the LNA, we propose a hybrid architecture that utilizes a combination of 2-stage single-ended and 4-stage differential common-source amplifiers. …”
Get full text
Article -
1758
Improving Patient Turnaround Time in Malaysian Hospitals with Real-Time IoT BLE Location Tracking
Published 2025-03-01“…Methods and analysis involve designing a Proof of Concept (POC) based on Internet of Things (IoT) technology, specifically utilizing Bluetooth Low Energy (BLE) and Received Signal Strength Indicator (RSSI) values to estimate patient proximity to strategically positioned Access Points (APs) within hospital facilities. …”
Get full text
Article -
1759
Outlier Detection in VPN Authentication Logs for Corporate Computer Networks Access using CRISP-DM
Published 2024-12-01Get full text
Article -
1760
Causal Intervention-Based Multimodal Class-Incremental Learning Network for 3D Model Classification and Retrieval
Published 2025-01-01“…This work provides theoretical support and technical implementation pathways for lifelong learning systems in complex 3D scenarios.…”
Get full text
Article